How Okta Delivers a Zero Trust Solution for Customers

The traditional workspace is a thing of the past. Employees need to stay productive whether they are working from the office, home, or a coffee shop – any location with access to the internet could be a potential workspace. This trend in work habits is largely due to the increased adoption of cloud applications in the enterprise – whether you have…

A Day in the Life of a Hacker with Matias Brutti

October is National Cybersecurity Awareness month, but for hackers, every day is spent staying aware of new cybersecurity threats. We were excited to sit down with Matias Brutti, Okta’s senior manager of research and exploitation, whose team spends time hacking to keep Okta’s customers safe from any potential vulnerabilities. Read on to see how…

Empowering You to Build Identity Into Every Customer Experience

You can’t go far without hearing an industry expert, executive or vendor talk about “digital transformation” and how “software is eating the world.” Whether or not you’re a fan of the buzzwords or phrases, it’s essential that every company starts to think and act like a software company to remain competitive and relevant. Regardless of your…

Oktane17: Identity for You

The pace of innovation today is relentless and accelerating, which makes staying up-to-date on the latest solutions that will help your employees be more productive, protect your business and increase your bottom line almost impossible. And that pace isn’t slowing down anytime soon. IDC predicts the cloud software market will be $152B by 2020 —…

What's Next in the Evolution of Password Management?

Since the early days of computing, users have inputted passwords to prove their identities. Today, as computers have progressed to something in everyone's pocket, password management is changing. No longer is having memorized an over-long string of numbers and letters the hallmark of a sophisticated user. Instead, authentication at the cutting…

The Importance of SSO in Enterprise IAM

In today’s identity management climate, single sign-on (SSO) capability is critical to the success of enterprise identity and access management (IAM). IT departments face growing demands: managing thousands of users, both internal and external, who each need access to an increasing number of cloud-based applications. Adding to this complexity is…

3 Important Security Trends Affecting Cloud Identity

The fast-changing world of cybersecurity can be complex, with plenty of news to sort through to find out what will affect IT systems in the months—and years—to come. In terms of cloud identity, zooming out to see the big picture reveals three particular trends that are poised to make a huge impact on security: the Internet of Things (IoT), Big…

What is SCIM?

SCIM, or System for Cross-domain Identity Management, is an open standard that allows for the automation of user provisioning. It was created in 2011 as it became clear that the technology of the future would be cloud-based. SCIM communicates user identity data between identity providers (such as companies with multiple individual users) and…

Tags

Archive

Follow Us
Share on Linkedin Share on Facebook Share on Youtube